QID 376178

Date Published: 2021-12-15

QID 376178: Apache Log4j Remote Code Execution (RCE) Vulnerability (CVE-2021-45046)

Apache Log4j is a Java-based logging utility. It is part of the Apache Logging Services, a project of the Apache Software Foundation.

CVE-2021-45046: A zero-day exploit affecting the popular Apache Log4j utility to Remote Code Execution and Denial of Service attack.

Affected versions:
Log4j versions from 2.x prior to 2.12.2
Log4j versions 2.13.0 prior to and including 2.15.0

QID Detection: (Authenticated) - Linux
This detection is based on querying the OS package managers on the target. If the target has a log4j package with an affected version, the target is flagged as vulnerable. This detection logic is updated to find log4j installs using the locate command and ls proc command.
QID Detection: (Authenticated) - Windows
On Windows system, the QID identifies vulnerable instance of log4j via WMI to check log4j included in the running processes via command-line.

Note:QID leverages the OS package manager to identify vulnerable Log4j packages. If the target does not have the vulnerable log4j package installed via the package manager, this QID might not get detected. This would typically happen when an application bundles the Log4j library in a jar etc.

Successful exploitation of this vulnerability could lead to Sensitive Information Disclosure and Remote Code Execution

  • CVSS V3 rated as Critical - 9 severity.
  • CVSS V2 rated as Medium - 5.1 severity.
  • Solution
    The vendor has released a fix for this vulnerability and the customers are advised to update their Log4j to the version 2.12.2 and 2.16.0. Please refer to the mitigations mentioned here Log4j.
    Vendor References

    CVEs related to QID 376178

    Software Advisories
    Advisory ID Software Component Link
    Apache Log4j URL Logo logging.apache.org/log4j/2.x/security.html